Cyber Security In Space Communications

Increasing demand for satellite communications connectivity and ground observation data, along with the continued conflict in Ukraine and escalating international geopolitical tensions in Gaza and Israel, has sparked a burgeoning interest and substantial investment in the space economy. 

The global space industry, currently valued at around $350 billion, projected to be worth $1 trillion by 2040. With so much at stake,  securing space-based systems has become a  crritical issue.

The Head of Space at the Ministry of Economic Affairs and Communications for Estonia, Paul Liias has said that the main drivers of investment are geopolitical tensions and the increasing demand for satellite communications. “Over the last 12 months as well, the conflict in Ukraine has underscored the strategic importance of space-based satellites and systems, more so than was the case three or four years ago... More than ever, we have a responsibility to manage and protect these systems properly with the latest cybersecurity measures,” Liias in advance the Software Defined Space Conference in Estonia.

The 3rd annual SDSC event focuses on cyber security in space, will take place Oct. 31 to Nov. 2 in Tallinn. The primary focus of this year’s event focused on software development and cyber security  in space technology. 

Liias focused on the importance of cyber security, saying that in order to protect space-based systems from cyber attacks, it is absolutely crucial to bring down the costs. “Developers working in space cyber security have to manage competing priorities. On the one hand, they must investigate, identify, and understand potential threats, and on the other, develop effective countermeasures at an affordable price point. Making space cyber security accessible and affordable is key,” he said.

Estonia is the home of the NATO Cooperative Cyber Defense Centre of Excellence and has been focusing on protecting critical infrastructure like power grids and government IT systems. The goernment now wants to apply its cyber security expertise to space-based assets.

Estonian - Software Defined Space Conference:  I-HLS:    Industrial Cyber:    Cybernews:   

Defense Post:     NATO/CCDCOE:         Image: falco

You Might Also Read: 

Satellite Systems Security Needs To Be Reinforced Against Cyber Attack:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« ZTNA Is The Foundation Of Great VDI Deployments
Iranian State Sponsored Hackers On The Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

Tresorit

Tresorit

Tresorit helps teams to collaborate securely and easily by protecting their data with end-to-end encryption.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Dermalog Identification Systems

Dermalog Identification Systems

Dermalog Identification Systems is a pioneer in biometry and the largest German manufacturer of biometric devices and systems.

Seculert

Seculert

The Seculert Attack Detection & Analytics Platform combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

Cyber Craft

Cyber Craft

CyberCraft is an innovative and dynamic software development, outsourcing and consulting company. Services offered include penetration testing.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

Riskonnect

Riskonnect

Riskonnect technology empowers organizations with the ability to anticipate, manage, and respond in real-time to strategic, operational, and digital risks across the extended enterprise.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.

Lithuanian Cyber Command (LTCYBERCOM)

Lithuanian Cyber Command (LTCYBERCOM)

The Lithuanian Cyber Command is responsible for planning and execution of operations in cyberspace and installation of strategic and operational communications and information systems.